Many products call themselves firewalls but in fact are not. Also, many firewall products are limited in their capabilities; for example, corporate firewalls tend to be concerned with attacks from outside, but not with viruses, Trojans, or adware that may be run on computers within the firewall, access servers elsewhere on the Internet, and transmit private information.
Microsoft Windows XP includes a built-in Internet Connection Firewall. When enabled, the Internet Connection Firewall blocks all unsolicited connections originating from the Internet outside a protected network and prevents the scanning of ports and resources.
When ShieldsUp is used to probe common ports on a (faculty) computer on the FIMS LAN, it returns the following information:
When commonly used ports are probed, the following results are reported:
Your system has achieved a perfect "TruStealth" rating. Not a single packet — solicited or otherwise — was received from your system as a result of our security probing tests. Your system ignored and refused to reply to repeated Pings (ICMP Echo Requests). From the standpoint of the passing probes of any hacker, this machine does not exist on the Internet.
|135||RPC (Remote Procedure Call)||Stealth|